ctitools/neurocti-mistral-nemo-12b-orkl-instruct-merged
Summarization • Updated • 12
text stringlengths 8 115k |
|---|
# Tracking Cobalt Strike: A Trend Micro Vision One Investigation
In late May, Trend Micro Managed XDR alerted a customer to a noteworthy Vision One alert on one of their endpoints. What followed was a deeper investigation that involved searching for other similarly infected endpoints and the confirmation of a Cobalt S... |
# ENISA Threat Landscape 2015
## About ENISA
The European Union Agency for Network and Information Security (ENISA) is a centre of network and information security expertise for the EU, its member states, the private sector, and Europe’s citizens. ENISA works with these groups to develop advice and recommendations on ... |
# Chasing Chaes Kill Chain
**January 25, 2022**
by Anh Ho and Igor Morgenstern
## Introduction
Chaes is a banking trojan that operates solely in Brazil and was first reported in November 2020 by Cybereason. In Q4 2021, Avast observed an increase in Chaes’ activities, with infection attempts detected from more than... |
# Operation RestyLink: 日本企業を狙った標的型攻撃キャンペーン
Ryu Hiyoshi
本日の記事は、SOC アナリスト 小池 倫太郎の記事です。
---
2022年4月中旬から日本企業を狙った標的型攻撃キャンペーンを複数の組織で観測しています。この攻撃キャンペーンは2022年3月にも活動していたと考えられ、また2021年10月にも関連した攻撃が行われていた可能性があります。このことから、短期・単発的な攻撃キャンペーンではなく、今後も攻撃が継続する可能性があります。本稿では、この攻撃キャンペーンについて詳細な解析を行い、その攻撃主体の帰属について検討します。
## 攻撃概要
2022年4月中旬に観... |
# Joker’s Stash, the Largest Carding Marketplace, Shuts Down
**January 15, 2021**
## Key Findings
Joker’s Stash, the largest dark web marketplace in the underground payment card economy, has announced that it is shutting down. While this marketplace was the largest in the carding space, it also exhibited a severe de... |
# Analyzing CrossRAT
**Objective-See**
**Date:** 1/24/2018
I'm on a plane again...this time flying home from one of my favorite hacker cons: ShmooCon! I was stoked to give a talk about auditing on macOS. Yah, I know that doesn't seem like the sexiest of topics - but if you're interested in incident response, malw... |
# CrystalBit / Apple Double DLL Hijack
As part of a rapid change in the work environment during the COVID-19 pandemic, Morphisec Labs has been tracking the change in the attack trend landscape. This has included the evolution of adware, PUA, and fraudulent software bundle delivery beyond a consumer problem into a sign... |
# MountLocker – Some Pseudo-Code Snippets
## Generate CLIENT_ID
```c
for (client_id_pos = StrStrIA(psz_recovery_manual_ransom_note, "%CLIENT_ID%"); client_id_pos; client_id_pos = StrStrIA(psz_recovery_manual_ransom_note, "%CLIENT_ID%")) {
cnt = 32i64;
client_id_str = g_str_879538e20b82e80052dd5f7ef9ad5077;
... |
# Cuba Ransomware Group’s New Variant Found Using Optimized Infection Techniques
Cuba ransomware is a malware family that has been seasonally detected since it was first observed in February 2020. It resurfaced in November 2021 based on the FBI’s official notice and has reportedly attacked 49 organizations in five cri... |
# The DAA File Format
In diary entry "Malicious .DAA Attachments", we extracted a malicious executable from a Direct Access Archive file. Let's take a closer look at this file format. Here is a hex/ascii dump of the beginning of the file:
With the source code of DAA2ISO, I was able to make some sense of this data. I ... |
# Raccoon Back with New Claws!
By Rahul R
July 18, 2022
Raccoon infostealer was first released in April 2019. The initial Version 1 (V1) was distributed in Telegram groups and other forums as Malware-as-a-Service (MaaS). Now the stealer has been updated with new features and comes packed with commercial packers. It... |
# Microsoft Exchange Servers Hacked to Deploy Cuba Ransomware
**By Bill Toulas**
**February 24, 2022**
The Cuba ransomware operation is exploiting Microsoft Exchange vulnerabilities to gain initial access to corporate networks and encrypt devices. Cybersecurity firm Mandiant tracks the ransomware gang as UNC2596 ... |
# Part 1: Analysing MedusaLocker Ransomware
In this 3-part post, we share the tradecraft from an RDP brute force linked ransomware event (MedusaLocker) we responded to in June 2020. We cover the business ramifications of the attack, technical analysis, and some advice based on attacks such as these.
Ransomware is a s... |
# Help for Ukraine: Free Decryptor for HermeticRansom Ransomware
On February 24th, the Avast Threat Labs discovered a new ransomware strain accompanying the data wiper HermeticWiper malware, which our colleagues at ESET found circulating in Ukraine. Following this naming convention, we opted to name the strain we foun... |
No dataset card yet